Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

The aesthetics of cyber security: How do users perceive them? (2306.08171v1)

Published 13 Jun 2023 in cs.CY

Abstract: While specific aesthetic philosophies may differ across cultures, all human societies have used aesthetics to support communication and learning. Within the fields of usability and usable security, aesthetics have been deployed for such diverse purposes as enhancing students' e-learning experiences and optimising user interface design. In this paper, we seek to understand how individual users perceive the visual assets that accompany cyber security information, and how these visual assets and user perceptions underwrite a distinct \emph{cyber security aesthetic}. We ask, (1) What constitutes cyber security aesthetics, from the perspective of an individual user? and (2) How might these aesthetics affect users' perceived self-efficacy as they informally learn cyber security precepts? To begin answering these questions, we compile an image-set from cyber security web articles and analyse the distinct visual properties and sentiments of these images.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (84)
  1. Hattwig, D., Bussert, K., Medaille, A., Burgess, J.: Visual literacy standards in higher education: New opportunities for libraries and student learning. portal: Libraries and the Academy 13(1), 61–89 (2013) (3) Nichols, J.: Illustrations of the Literary History of the Eighteenth Century vol. 8. Nichols; Bentley, ??? (1858) (4) Marland, A.: Political photography, journalism, and framing in the digital age: The management of visual media by the prime minister of canada. The International Journal of Press/Politics 17(2), 214–233 (2012) (5) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nichols, J.: Illustrations of the Literary History of the Eighteenth Century vol. 8. Nichols; Bentley, ??? (1858) (4) Marland, A.: Political photography, journalism, and framing in the digital age: The management of visual media by the prime minister of canada. The International Journal of Press/Politics 17(2), 214–233 (2012) (5) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marland, A.: Political photography, journalism, and framing in the digital age: The management of visual media by the prime minister of canada. The International Journal of Press/Politics 17(2), 214–233 (2012) (5) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  2. Nichols, J.: Illustrations of the Literary History of the Eighteenth Century vol. 8. Nichols; Bentley, ??? (1858) (4) Marland, A.: Political photography, journalism, and framing in the digital age: The management of visual media by the prime minister of canada. The International Journal of Press/Politics 17(2), 214–233 (2012) (5) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marland, A.: Political photography, journalism, and framing in the digital age: The management of visual media by the prime minister of canada. The International Journal of Press/Politics 17(2), 214–233 (2012) (5) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  3. Marland, A.: Political photography, journalism, and framing in the digital age: The management of visual media by the prime minister of canada. The International Journal of Press/Politics 17(2), 214–233 (2012) (5) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  4. Cooper, N., Holman, V.: War and visual culture since 1900. Journal of War & Culture Studies 1(3), 219–222 (2008) (6) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  5. Meyer, B., Verrips, J.: Aesthetics. Routledge, ??? (2008) (7) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  6. David, A., Glore, P.: The impact of design and aesthetics on usability, credibility, and learning in an online environment. Online Journal of Distance Learning Administration 13(4) (2010) (8) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  7. Mitchell, C., Weber, S., O’Reilly-Scanlon, K.: Just who do we think we are. Methodologies for (2005) (9) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  8. Page, T.: Skeuomorphism or flat design: future directions in mobile device user interface (ui) design education. International Journal of Mobile Learning and Organisation 8(2), 130–142 (2014) (10) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  9. Curtis, A.: Rhetoric of Flat Design and Skeuomorphism in Apple’s iOS Graphical User Interface. University of Rhode Island, ??? (2015) (11) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  10. Tharangie, K., Irfan, C., Marasinghe, C., Yamada, K.: Kansei engineering assessing system to enhance the usability in e-learning web interfaces: Colour basis. In: 16th International Conference on Computers in Education, vol. 1, pp. 145–150 (2008) (12) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  11. Reyna, J.: The importance of visual design and aesthetics in e-learning. Training and Development 40(5), 28–31 (2013) (13) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  12. Malcolm, J., Hodkinson, P., Colley, H.: The interrelationships between informal and formal learning. Journal of Workplace Learning (2003). https://doi.org/10.1108/13665620310504783 (14) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  13. Ollis, T.: Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning 51(2), 248–268 (2011) (15) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  14. Flavián, C., Gurrea, R., Orús, C.: A heuristic evaluation of websites design for achieving the web success. International Journal of Services and Standards 5(1), 17–41 (2009) (16) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  15. Joshi, D., Datta, R., Fedorovskaya, E., Luong, Q.-T., Wang, J.Z., Li, J., Luo, J.: Aesthetics and emotions in images. IEEE Signal Processing Magazine 28(5), 94–115 (2011) (17) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  16. Shires, J.: Cyber-noir: Cybersecurity and popular culture. Contemporary Security Policy 41(1), 82–107 (2020) (18) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  17. Carroll, F.: Usable security and aesthetics: Designing for engaging online security warnings and cautions to optimise user security whilst affording ease of use. In: European Symposium on Usable Security 2021, pp. 23–28 (2021) (19) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  18. Fogg, B.J.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology, pp. 1–7 (2009) (20) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  19. Robinson, L., Schulz, J., Blank, G., Ragnedda, M., Ono, H., Hogan, B., Mesch, G., Cotten, S.R., Kretchmer, S.B., Hale, T.M., et al.: Digital inequalities 2.0: Legacy inequalities in the information age (2020) (21) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  20. Alsudani, F., Casey, M.: The effect of aesthetics on web credibility. People and Computers XXIII Celebrating People and Technology, 512–519 (2009) (22) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  21. Ma, K.-L.: Cyber security through visualization. In: Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation-Volume 60, pp. 3–7 (2006). Citeseer (23) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  22. Bernal, V.: 1. the aesthetics of cyber insecurity: Displaying the digital in three american museum exhibits. In: Futureproof, pp. 33–62. Duke University Press, ??? (2020) (24) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  23. Ghertner, D.A., McFann, H., Goldstein, D.M.: Futureproof: Security Aesthetics and the Management of Life. Duke University Press, ??? (2020) (25) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  24. Dewey, J.: Art as experience. New York: wideview. Pedigree Books (1934) (26) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  25. Beardsley, M.C.: Aesthetics from Classical Greece to the Present vol. 13. University of Alabama Press, ??? (1975) (27) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  26. Kant, I.: The Critique of Judgment. Prometheus Books, ??? (1892) (28) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  27. Zander, T., Öllinger, M., Volz, K.G.: Intuition and insight: Two processes that build on each other or fundamentally differ? Frontiers in Psychology 7, 1395 (2016) (29) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  28. Walsh, D.: Aesthetic objects and works of art. The Journal of Aesthetics and Art Criticism 33(1), 7–12 (1974) (30) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  29. Wissenburg, I.: Aesthetic communication on the possibility of combining semiotics and aesthetics: analysis of ‘delftsche slaolie’by jan toorop. B.S. thesis, Universiteit Utrecht (2012) (31) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  30. Barbosa, S.D.J., Barbosa, G.D.J., Souza, C.S.d., Leitão, C.F.: A semiotics-based epistemic tool to reason about ethical issues in digital technology design and development. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, pp. 363–374 (2021) (32) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  31. Cheng, L., Pei, J., Danesi, M.: A sociosemiotic interpretation of cybersecurity in u.s. legislative discourse. Social Semiotics 29(3), 286–302 (2019) https://doi.org/10.1080/10350330.2019.1587843. https://doi.org/10.1080/10350330.2019.1587843 (33) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  32. Sayers, S.: Jacques rancière (2004) the politics of aesthetics: the distribution of the sensible. Culture Machine, Reviews (2005) (34) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  33. Rudner, R.: On semiotic aesthetics. The Journal of Aesthetics and Art Criticism 10(1), 67–77 (1951) (35) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  34. Chatterjee, A.: The Aesthetic Brain: How We Evolved to Desire Beauty and Enjoy Art. Oxford University Press, ??? (2014) (36) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  35. Carper, B.A.: Fundamental Patterns of Knowing in Nursing. Teachers College, Columbia University, ??? (1975) (37) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  36. Keenan, T.M.: The use of aesthetic knowledge in decision making processes in mega projects. PhD thesis, Queensland University of Technology (2016) (38) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  37. Carroll, F.: Designing (for) experiences in photorealistic vr environments. New Review of Hypermedia and Multimedia 16(1-2), 181–194 (2010) (39) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  38. Fernandes, M., Walls, L., Munson, S., Hullman, J., Kay, M.: Uncertainty displays using quantile dotplots or cdfs improve transit decision-making. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2018) (40) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  39. Rader, E., Wash, R., Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1–17 (2012) (41) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  40. Bandura, A., Freeman, W.H., Lightsey, R.: Self-efficacy: The Exercise of Control. Springer, ??? (1999) (42) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  41. Maddux, J.E.: Self-efficacy theory. In: Self-efficacy, Adaptation, and Adjustment, pp. 3–33. Springer, ??? (1995) (43) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  42. Stumpf, S.A., Brief, A.P., Hartman, K.: Self-efficacy expectations and coping with career-related events. Journal of Vocational Behavior 31(1), 91–108 (1987) (44) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  43. Herley, C.E.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW ’09, pp. 133–144. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1719030.1719050. https://doi.org/10.1145/1719030.1719050 (45) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  44. Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Aloul, F., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318–324 (2016) (46) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  45. Ajzen, I.: The theory of planned behaviour. organizational behaviour and human decision processes, 50 (2), 179-211. View at (1991) (47) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  46. Bosma, N., Hessels, J., Schutjens, V., Van Praag, M., Verheul, I.: Entrepreneurship and role models. Journal of economic psychology 33(2), 410–424 (2012) (48) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  47. Marres, N., Weltevrede, E.: Scraping the social? issues in live social research. Journal of Cultural Economy 6(3), 313–335 (2013). https://doi.org/10.1080/17530350.2013.772070 (49) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  48. Schatz, D., Bashroush, R., Wall, J.: Towards a more representative definition of cyber-security. Journal of Digital Forensics, Security and Law 12(2), 53–74 (2017). https://doi.org/10.15394/jdfsl.2017.1476 (50) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  49. Humayun, M., Niazi, M., Jhanjhi, N., Alshayeb, M., Mahmood, S.: Cyber-security threats and vulnerabilities: a systematic mapping study. Arabian Journal for Science and Engineering 45(4), 3171–3189 (2020) (51) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  50. Kosar, T., Bohra, S., Mernik, M.: Protocol of a systematic mapping study for domain-specific languages. Journal of Information and Software Technology 21(C), 77–91 (2016) (52) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  51. Csurka, G., Dance, C., Fan, L., Willamowski, J., Bray, C.: Visual categorization with bags of keypoints. In: Workshop on Statistical Learning in Computer Vision, ECCV, vol. 1, pp. 1–2 (2004). Prague (53) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  52. Weller, H.I., Westneat, M.W.: Quantitative color profiling of digital images with earth mover’s distance using the R package colordistance. PeerJ 7, 6398 (2019) (54) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  53. Rubner, Y., Tomasi, C., Guibas, L.J.: The earth mover’s distance as a metric for image retrieval. International Journal of Computer Vision 40(2), 99–121 (2000) (55) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  54. Gupta, A., Thakkar, K., Gandhi, V., Narayanan, P.: Nose, eyes and ears: Head pose estimation by locating facial keypoints. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1977–1981 (2019). IEEE (56) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  55. Wäldchen, J., Mäder, P.: Plant species identification using computer vision techniques: A systematic literature review. Archives of Computational Methods in Engineering 25(2), 507–543 (2018) (57) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  56. Samek, W., Binder, A., Montavon, G., Lapuschkin, S., Müller, K.-R.: Evaluating the visualization of what a deep neural network has learned. IEEE transactions on neural networks and learning systems 28(11), 2660–2673 (2016) (58) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  57. Johnson, M.R.: The history of cyberspace aesthetics in video games. In: Cyberpunk and Visual Culture, pp. 139–154. Routledge, ??? (2017) (59) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  58. Gibson, W.: Neuromancer vol. 1. Aleph, ??? (1984) (60) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  59. Benedikt, M.L.: Cyberspace: First Steps. MIT Press, ??? (1991) (61) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  60. Branch, J.: What’s in a name? metaphors and cybersecurity. International Organization 75(1), 39–70 (2021). https://doi.org/10.1017/S002081832000051X (62) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  61. Nye, D.E.: American Technological Sublime. mit Press, ??? (1996) (63) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  62. Featherstone, M., Burrows, R.: Cyberspace/cyberbodies/cyberpunk: Cultures of Technological Embodiment. Sage, ??? (1996) (64) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  63. Croon, A.: Making sense of cyberspace: a question of being-with information technology. In: Exploring Cyber Society, pp. 1–9 (1999). Univeristy of Northumbria at Newcastle (65) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  64. Shedroff, N., Noessel, C.: Make It So: Interaction Design Lessons from Science Fiction. Rosenfeld Media, ??? (2012) (66) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  65. Greenspan, S.: Future screens are mostly blue (2013). https://99percentinvisible.org/episode/future-screens-are-mostly-blue/ (67) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  66. Beasley, R., Danesi, M.: Persuasive Signs: The Semiotics of Advertising vol. 4. Walter de Gruyter, ??? (2010) (68) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  67. Kearney, R., Rasmussen, D.: Continental aesthetics: Romanticism to postmodernism: An anthology (2001) (69) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  68. Thomas, P.: Discursive trick effects: How raced and gendered semiotics in industry media undermine equal representation in the cybersecurity workforce (2020) (70) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  69. Jethwani, M.M., Memon, N., Seo, W., Richer, A.: “i can actually be a super sleuth” promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research 55(1), 3–25 (2017) (71) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  70. Sob, T.: “hackerman”: How diverging cyberspace portrayals influence the adf’s perception of cybersecurity and the cultural ramifications of these judgements. Australian Defense Force - Cyber Security Challenges 1(1) (2021) (72) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jakubietz, R.G., Jakubietz, M.G., Kloss, D., Gruenert, J.G.: Defining the basic aesthetics of the hand. Aesthetic plastic surgery 29(6), 546–551 (2005) (73) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  71. Goldin-Meadow, S., Wagner, S.M.: How our hands help us learn. Trends in cognitive sciences 9(5), 234–241 (2005) (74) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  72. Gaines, B.: Machinic eyes: New and post-digital aesthetics, surveillance, and resistance. PhD thesis, Clemson University (2019) (75) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  73. Papadopoulou, A.: As seen in your prospectus: A critical essay on the representation of ethnic diversity in stock photography (2014) (76) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  74. Sloterdijk, P.: Spheres volume i: Bubbles microspherology. Los Angeles: Semiotext (e) (2011) (77) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  75. Hall, P., Heath, C., Coles-Kemp, L.: Critical visualization: a case for rethinking how we visualize risk and security. Journal of Cybersecurity 1(1), 93–108 (2015) https://academic.oup.com/cybersecurity/article-pdf/1/1/93/7001223/tyv004.pdf. https://doi.org/10.1093/cybsec/tyv004 (78) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  76. Kikuchi, J.F., Simmons, H.: Philosophic inquiry in nursing (1992) (79) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  77. Neocleous, M.: Critique of Security. Edinburgh University Press, ??? (2008) (80) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  78. McSweeney, W., Bill, M.: Security, Identity and Interests: a Sociology of International Relations vol. 69. Cambridge University Press, Cambridge, ??? (1999) (81) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  79. Jones, P., Powell, J.: Gary anderson has been found! Resource Recycling 18, 25–27 (1999) (82) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  80. Czopp, A.M., Kay, A.C., Cheryan, S.: Positive stereotypes are pervasive and powerful. Perspectives on Psychological Science 10(4), 451–463 (2015) (83) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  81. Tufte, E.R.: Beautiful Evidence. Graphis Pr, ??? (2006) (84) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  82. Hoffmann, R.: Thoughts on aesthetics and visualization in chemistry. HYLE–International Journal for Philosophy of Chemistry 9(1), 7–10 (2003) (85) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  83. Karademas, E.C., Kafetsios, K., Sideridis, G.D.: Optimism, self-efficacy and information processing of threat-and well-being-related stimuli. Stress and Health: Journal of the International Society for the Investigation of Stress 23(5), 285–294 (2007) (86) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013) Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)
  84. Mohammad, S.: Colourful language: Measuring word-colour associations. arXiv preprint arXiv:1309.5942 (2013)

Summary

We haven't generated a summary for this paper yet.